Sciweavers

186 search results - page 32 / 38
» On the use of anycast in DNS
Sort
View
CCS
2007
ACM
14 years 2 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...
CONEXT
2006
ACM
14 years 2 months ago
Migrating home agents towards internet-scale mobility deployments
While the IETF standardization process of the Mobile IPv6 and Network Mobility (NEMO) protocols is almost complete, their large-scale deployment is not yet possible. With these te...
Ryuji Wakikawa, Guillaume Valadon, Jun Murai
ICICS
2007
Springer
14 years 2 months ago
Drive-By Pharming
Inexpensive broadband routers are a popular way for people to create an internal, and sometimes wireless, network in their homes. By purchasing such a router and plugging it in, t...
Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
CEAS
2005
Springer
14 years 2 months ago
Accredited DomainKeys: A Service Architecture for Improved Email Validation
We present an architecture called Accredited DomainKeys, which builds on the DomainKeys email authentication infrastructure to address the following questions: • “Did the send...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
IPTPS
2005
Springer
14 years 2 months ago
Locality Prediction for Oblivious Clients
To improve performance, large-scale Internet systems require clients to access nearby servers. While centralized systems can leverage static topology maps for rough network distan...
Kevin P. Shanahan, Michael J. Freedman